1 |
Self-control, gang membership, and victimization: An integrated approach to the risk factors of violent victimizationChilds, Kristina 01 June 2005 (has links)
This study integrates one of the most empirically tested individual characteristics (self-control) with situational factors (risky lifestyle) in an attempt to explain the risks involved in violent victimization. Data came from a diverse sample of 3,907 middle school students who participated in the G.R.E.A.T. program during the 1993-1994 school year. Gang membership is used as a proxy variable to measure risky lifestyle. It is hypothesized that 1) gang membership will mediate the effect of self-control on violent victimization and 2) self-control and gang membership will interact to amplify the risk of violent victimization. Logistic regression was used to analyze the prevalence of violent victimization and negative binomial regression was used to analyze frequency of violent victimization. When all other extraneous factors were controlled, insufficient evidence was found to support the hypotheses of this study.
A discussion of the findings, as well as theoretical implications and suggestions for future research are discussed.
|
2 |
Exploring the Implementation of Cloud Security to Minimize Electronic Health Records CyberattacksTyler, Lamonte Bryant 01 January 2018 (has links)
Health care leaders lack the strategies to implement cloud security for electronic medical records to prevent a breach of patient data. The purpose of this qualitative case study was to explore strategies senior information technology leaders in the healthcare industry use to implement cloud security to minimize electronic health record cyberattacks. The theory supporting this study was routine activities theory. Routine activities theory is a theory of criminal events that can be applied to technology. The study's population consisted of senior information technology leaders from a medical facility in a large northeastern city. Data collection included semistructured interviews, phone interviews, and analysis of organizational documents. The use of member checking and methodological triangulation increased the validity of this study's findings among all participants. There were 5 major themes that emerged from the study (a) requirement of coordination with the electronic health record vendor and the private cloud vendor, (b) protection of the organization, (c) requirements based on government and organizational regulations, (d) access management, (e) a focus on continuous improvement. The results of this study may create awareness of the necessity to secure electronic health records in the cloud to minimize cyberattacks. Cloud security is essential because of its social impact on the ability to protect confidential data and information. The results of this study will further serve as a foundation for positive social change by increasing awareness in support of the implementation of electronic health record cloud security.
|
3 |
The Effect of Police Organization on Computer CrimeKoksal, Tamer 20 July 2009 (has links)
No description available.
|
Page generated in 0.0529 seconds